Abstract is missing.
- LOMAC: MAC You Can Live WithTimothy Fraser. 1-13 [doi]
- TrustedBSD: Adding Trusted Operating System Features to FreeBSDRobert N. M. Watson. 15-28 [doi]
- Integrating Flexible Support for Security Policies into the Linux Operating SystemPeter Loscocco, Stephen Smalley. 29-42 [doi]
- A Practical Scripting Environment for Mobile DevicesBrian Ward. 43-53 [doi]
- Nickle: Language Principles and PragmaticsBart Massey, Keith Packard. 55-68 [doi]
- The Design and Implementation of the NetBSD rc.d SystemLuke Mewburn. 69-79 [doi]
- User-Level Checkpointing for LinuxThreads ProgramsWilliam R. Dieter, James E. Lumpp Jr.. 81-92 [doi]
- Building an Open-source Solaris-compatible Threads LibraryJohn Wood. 93-104 [doi]
- Are Mallocs Free of Fragmentation?Aniruddha Bohra, Eran Gabber. 105-117 [doi]
- Sandboxing ApplicationsVassilis Prevelakis, Diomidis Spinellis. 119-126 [doi]
- Building a Secure Web BrowserSotiris Ioannidis, Steven M. Bellovin. 127-134 [doi]
- Citrus Project: True Multilingual Support for BSD Operating SystemsJun-ichiro itojun Hagino. 135-139 [doi]
- Kqueue - A Generic and Scalable Event Notification FacilityJonathan Lemon. 141-153 [doi]
- Improving the FreeBSD SMP ImplementationGreg Lehey. 155-164 [doi]
- Page Replacement in Linux 2.4 Memory ManagementRik van Riel. 165-172 [doi]
- User-Level Extensibility in the Mona File SystemPaul W. Schermerhorn, Robert J. Minerick, Peter W. Rijks, Vincent W. Freeh. 173-183 [doi]
- Volume Managers in LinuxDavid Teigland, Heinz Mauelshagen. 185-197 [doi]
- The Design and Implementation of a Transparent Cryptographic File System for UNIXGiuseppe Cattaneo, Luigi Catuogno, Aniello Del Sorbo, Pino Persiano. 199-212 [doi]
- Design and Implementation of the X Rendering ExtensionKeith Packard. 213-224 [doi]
- Scwm: An Extensible Constraint-Enabled Window ManagerGreg J. Badros, Jeffrey Nichols, Alan Borning. 225-234 [doi]
- The X Resize and Rotate Extension - RandRJim Gettys, Keith Packard. 235-243 [doi]
- MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows ExecutablesMatthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyya, Salvatore J. Stolfo. 245-252 [doi]
- Cost Effective Security for Small BusinessesSean R. Brown. 253-266 [doi]
- Heimdal and Windows 2000 Kerberos - How to Get Them to Play TogetherAssar Westerlund, Johan Danielsson. 267-272 [doi]
- Predictable Management of System Resources for LinuxMansoor Alicherry, K. Gopinath. 273-283 [doi]
- Scalable Linux SchedulingStephen Molloy, Peter Honeyman. 285-295 [doi]
- A Universal Dynamic Trace for Linux and Other Operating SystemsRichard J. Moore. 297-308 [doi]